Blame Remote Work, Poorly Secured Cloud Technologies for Recent Cyber Attacks
SolarWinds, CISA and the White House issued new information regarding the state of cyber and advised how to better secure critical infrastructure.

Private and public-sector cyber leaders last week unleashed a flurry of memos and reports doubling down on protecting critical infrastructure from cyberattacks and attributing the rise in cyber threats and vulnerabilities to remote work and poorly secured cloud-based technologies.
SolarWinds, the IT management software company at the epicenter of the software supply chain hack that roiled the cyber world in December 2020, released a new report revealing a sharp increase in cyber vulnerabilities at public-sector organizations during the pandemic. SolarWinds believes remote work and a dip in โcyber awarenessโ as IT employees begin to burn out after a โcrisisโ year are the primary reasons for the increase in cyber vulnerabilities at public sector organizations.
The Cybersecurity and Infrastructure Security Agency (CISA) also released a joint cybersecurity advisory with the Australian Cyber Security Centre (ACSC), United Kingdomโs National Cyber Security Centre (NCSC) and the Federal Bureau of Investigation (FBI) highlighting remote work, VPNs and cloud-based technologies as the top targets for cyber criminals and malicious nation-state actors in 2020.
In 2021, โperimeter-type devicesโ on the network edge are the new hot targets. That includes cell phones, laptops and any devices connected to an organizationโs cloud-based network.
The White House then issued a memo announcing an Industrial Control Systems Cybersecurity Initiative headed by the Department of Homeland Security to ensure and enhance critical infrastructure resiliency against cyberattacks.
The news comes as ransomware attacks pummel federal agencies and critical infrastructure sectors, such as water and energy, after many of these organizations shifted to remote work due to the COVID-19 pandemic.
According to SolarWinds and CISA, this shift to remote work spawned a wealth of opportunities for cyber criminals and nation-state actors to exploit remote employeesโ lack of cyber awareness or lack of adequate cyber resources in a remote environment.
SolarWinds believes now is the time for public-sector organizations to refine and enforce aggressive cybersecurity strategies before โcyber complacencyโ takes hold.
โAlthough the shift to remote work was cited as a leading factor in heightened risk exposure for businesses over the past year, many tech pros (professionals) have reached the point where theyโre confident with remote-work policies โ but this moment in time represents a critical inflection point for organizations, as hubris can sink into widespread security apathy and complacency,โ according to the SolarWinds report.
Despite the grim warning about the cyber dangers of remote work, 59% of respondents to SolarWindsโ survey โare confident or extremely confident their IT organizations will continue to invest in risk management/mitigation technologies over the next three years,โ and 81% agree or strongly agree their IT organizations are โprepared to manage, mitigate and resolve risk factor-related issues due to the policies and/or procedures they already have in place.โ
Tech professionals at public-sector organizations listed investments in security, network infrastructure and cloud computing as their top three strategies for mitigating cyber risk, according to the report, but only 31% of survey respondents believe their tech leaders are โprepared to mitigate and manage risk.โ
โWhen it comes to risk management and mitigation, prioritizing intentional investments in technology solutions that meet business needs is critical,โ said Sudhakar Ramakrishna, president and CEO of SolarWinds, in the press release. โMore than ever before, tech pros must partner closely with business leaders to ensure they have the resources and headcount necessary to proactively address security risks. And more importantly, tech pros should constantly assess their risk management, mitigation and protocols to avoid falling into complacency and being โblindโ to risk.โ
CISA amplified the importance of cyber hygiene in its advisory and encouraged private and public organizations to routinely share information with CISA regarding cyber incidents and vulnerabilities. The agency also said consistent software patching is one of the most important things an organization can do to avoid breaches.
โOrganizations that apply the best practices of cybersecurity, such as patching, can reduce their risk to cyber actors exploiting known vulnerabilities in their networks,โ said Eric Goldstein, executive assistant director for cybersecurity at CISA, according to the press release.
This is a carousel with manually rotating slides. Use Next and Previous buttons to navigate or jump to a slide with the slide dots
-
Air Force, Coast Guard Talk Data Security Efforts for AI Development
The services' AI initiatives include efforts like creating clean training data, countering data poisoning and bridging siloed teams.
4m read -
Software Factories Accelerate Federal Modernization Outcomes
IT leaders from Nutanix and SAIC explain how software factories streamline tech development, modernize legacy systems and accelerate adoption of emerging technologies like AI.
20m watch -
DHS Secretary Urges Congress to Reauthorize CISA 2015
Federal leaders highlight CISA 2015's role in strengthening public-private partnerships and defending against evolving cyber threats.
3m read -
Rep. Gerry Connolly Leaves Lasting Mark on Federal Tech
Connolly's leadership in Congress significantly advanced government IT, emphasizing accountability, efficiency and a robust cybersecurity posture.
4m read